Business Email Compromise (BEC) attacks can deliver a fatal blow to an organization’s cybersecurity plan. With social engineering lures gaining popularity among hackers leading them to execute more successful phishing campaigns. With such... Read more
The REvil ransomware is known for evolving and introducing new tactics to benefit itself and its affiliates. A new tactic has been adopted by the ransomware this time by which its affiliates can use to exert even more pressure on victims. The Up... Read more
A Doppler that spreads through Google Play Store to deliver financial Trojans has been discovered. Named Clast82, the dropper was found spreading AlienBot Banker and MRAT trojans on infected Android devices. Grabbing the limelight Ten utility ap... Read more
A Ransomware that not only encrypts your files but also delivers a message displaying its support towards the ongoing farmer’s protest in India, has been detected by researchers. A new set of laws were passed by the Indian government last... Read more
In order to hide its backup C2 IP addresses, a recent crypto mining botnet campaign has been observed using Bitcoin blockchain transactions. It’s turned out to be a very effective way of staying undetected and avoiding any takedown attempts. The... Read more